<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">

	<channel>
		<title><![CDATA[ICT Insight | Darwin Blog - Articles - Mobile Devices]]></title>
		<link>https://www.itblog.com.au</link>
		<description><![CDATA[Technology blog site for Darwin and Northern Territory based companies to read about technology without all the heavy technical details. We aim to provide useful articles, advice and information to assist in working out where your business needs to be with Information Technology and Communications in the workplace. Topics that we will cover, SPAM, Exploits, Security, CCTV General IT, Cloud, Mobile Devices, Telephony, Communications, Software, Business Process and many more topics that you need to assist in developing your business.]]></description>
		<language>en-us</language>
		<copyright><![CDATA[https://www.itblog.com.au]]></copyright>
		<generator>N/A</generator>
		<webMaster>help@web365.com.au</webMaster>
		<lastBuildDate>Mon, 02 Mar 2020 20:46:50 ACST</lastBuildDate>
		<ttl>20</ttl>
		<item>
			<title><![CDATA[Mobile Device Protection]]></title>
			<link>https://www.itblog.com.au/articles/10/1/Mobile-Device-Protection/Page1.html</link>
			<description><![CDATA[<p>Mobile apps are often the cause of unintentional data leakage, for example, &ldquo;riskware&rdquo; apps pose a real problem for mobile users, who give them sweeping permissions, but don&rsquo;t always check security. These are typically free apps found in official app stores that perform as advertised, but also send personal&mdash;and potentially corporate&mdash;data to a remote server, where it is mined by advertisers or even cybercriminals.<br /><br />Data leakage can also happen through hostile enterprise-signed mobile apps. Here, mobile malware uses distribution code native to popular mobile operating systems like iOS and Android to spread valuable data across corporate networks without raising red flags. To avoiding this problem. only give apps permissions they absolutely insist on, and forgo any program that asks for more than necessary.</p>
<p>Since mobile devices are always powered-on they represent the front lines of any phishing attack. Mobile users are more vulnerable, since they are often the first to receive legitimate-seeming emails and take the bait. Desktop users who only check their email once a day or every other day are often warned off by news sites or security bulletins before clicking through. Email monitoring is crucial. Never click on unfamiliar email links. On a smaller mobile screen, they can be even harder to verify. Always enter URLs manually to be as safe as possible.</p>
<p>Many applications from the Android PlayStore are unchecked for malicious code and can be used to capture your secure data, we have even seen in the past 6 months and attack on users where their phone service provider was changed away from Telstra, they received text messages that they followed which installed another app on the phone.&nbsp; 24 hours later their bank accounts were drained and Westpac &amp; NT Police began an investigation into the hack.&nbsp; This is an extreme case however the users did not have any virus protection and did not read what they were clicking on in the text messages they received.</p>
<p>The moral of the story is purchase and install Virus Protection on your mobile devices, we sell and support Webroot for a monthly fee. For more information contact <a href="www.techsolutions.com.au" target="_blank">Territory Technology Solutions</a> on 08 8944 2222.</p>
<div id="mcePasteBin" style="position: absolute; top: 0px; left: 0; background: red; width: 1px; height: 1px; overflow: hidden;">
<div>Since mobile devices are always powered-on they represent the front lines of any phishing attack. According to CSO, mobile users are more vulnerable, since they are often the first to receive legitimate-seeming emails and take the bait. Desktop users who only check their email once a day or every other day are often warned off by news sites or security bulletins before clicking through. Email monitoring is crucial. Never click on unfamiliar email links. On a smaller mobile screen, they can be even harder to verify. Always enter URLs manually to be as safe as possible</div>
</div>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Fri, 09 Dec 2016 11:30:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/10/1/Mobile-Device-Protection/Page1.html</guid>
		</item>
		<item>
			<title><![CDATA[iOS Security]]></title>
			<link>https://www.itblog.com.au/articles/7/1/iOS-Security/Page1.html</link>
			<description><![CDATA[<p><strong>Why security matters</strong><br />Just because almost all mobile malware targets Android doesn&rsquo;t mean iPhone users can be complacent.<br /><br />Quite the reverse:<br /><br />We need to be even more alert in case attackers use complacency against us. What follows are a few simple tips to help you secure your iPhone (and iPad).<br /><br /><strong></strong><br /><br />There is no way to deny that iPhones are in the ascendant, particularly in enterprise IT. Beyond business, you&rsquo;ll see them used by educators, doctors, police and politicians and in each one of those cases the information on those smartphones is confidential and must not be abused.<br /><br />Security is mandatory. Fortunately, Apple works really hard to balance security with usability<br /><br /><strong>Secure yourself</strong><br />So, what&rsquo;s the weakest point in mobile device security? Sadly, it&rsquo;s you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All these common flaws contribute to your security weakness. If you want to secure your mobile devices, then you should start with good security habits:<br /><br />- Avoid clicking links from people you don&rsquo;t know.<br />- Never download/install software unless you know where it is from.<br />- Use strong passwords, and use different passwords for each site<br />- Use two-step verification everywhere.<br />- Use Private Browsing when visiting websites.<br />- Use a disposable email address to sign up for services, websites and the like<br />- Never access a confidential service (such as your enterprise intranet or online bank) over public Wi-Fi.<br />- Now let&rsquo;s take a closer look at some of the many other ways you can secure your iPhone/iPad life.<br /><br /><strong>Security updates</strong><br />Apple watches security on its devices closely. For example, when the first zero-day exploit aimed at iOS was identified in 2016, Apple issued a security update to patch the problem within a few days. If you care about your device security you must absolutely ensure you install all the latest iOS upgrades. (Android users may want to look away at this point, as they have nothing like as much protection).<br /><br /><strong>Passcodes: the most important security you have</strong><br />The passcode is the single most important security protection you have on your device. If you want to be secure you absolutely must use a passcode.<br /><br />Do you use any of these as your passcode?<br /><br />123456<br />password<br />12345678<br />These were the three most commonly used passwords in 2016. That&rsquo;s why they are among the first passcodes people use if they want to unlock your device without your permission.<br /><br />A report claims it would take a computer an estimated 72-years to hack into a 6-digit alphanumeric passcode, or an estimated 7-minutes to get through a 4-digit numeric code. It would take a human 2,700 years to get through a 6-digit alphanumeric passcode.<br /><br />You must use a stronger passcode.<br /><br />What you have to understand is that at Apple, the passcode is still the most important part of your iOS security set-up.<br /><br />Face ID and Touch ID are good, but they exist for your convenience more than anything else. Both biometric authorization methods depend on you using a unique and hard to break passcode. That&rsquo;s why you are asked for your passcode when you restart your device, or an Apple Pay transaction fails to recognise your fingerprint, or when the device is left unused for a day or two.<br /><br />One good way to create a tough password is to make a memorable sentence, such as &ldquo;The Quick Brown Fox Jumps over the lazy dogs&rdquo; and then use the second letter from each word (with punctuation) as you code: ihaovly2i,m.<br /><br />The best way to protect your device is to use an alphanumeric code. To create one you must open Settings&gt;Touch ID &amp; Passcode, and select Change Passcode.<br /><br />You&rsquo;ll be asked to enter your existing passcode and then asked to enter a new one. Don&rsquo;t enter a new one. Instead, tap the words Passcode Options at the bottom of the screen, Now you can create a rock solid alphanumeric code.<br /><br /><strong>Face ID, Touch ID</strong><br />Apple claims that Face ID is more secure than the fingerprint-based Touch ID. It says there is only a one in a million chance a random person could unlock your iPhone by looking at it using Face ID, compared with a one in 50,000 probability when using Touch ID.<br /><br />&ldquo;FaceID makes using a longer, more complex passcode far more practical because you don&rsquo;t need to enter it as frequently,&rdquo; Apple said in a security white paper.<br /><br />What we&rsquo;re saying is that while you can use these as a convenience, you should always ensure your passcode remains your primary security protection.<br /><br /><strong>Turn on Two-factor authentication</strong><br />Open Password &amp; Security in Settings and turn on 2-factor authentication. Once it is enabled you'll need to provide two pieces of information (your password and the six-digit verification code) when attempting to sign in to your Apple ID on a new device.<br /><br />You must also set a Trusted Phone Number here. This is a number that can be used to receive verification codes by text message or automated phone call.<br /><br />It&rsquo;s good practice to verify a few numbers here, your home number and that of a trusted third party, for example. You can then use those numbers to get the code to enter your own device if you need to do so.<br /><br /><strong>Set up erase data</strong><br />What happens if someone tries to open your iPhone? Unless you set this protection up they will be able to try and keep trying until they break in.&nbsp; The Erase data feature is available in Settings&gt;Touch ID &amp; Passcode screen.<br /><br />Set the Erase Data toggle to green and all the data on your iPhone will be erased after 10 failed passcode attempts. That&rsquo;s not such great news if you forget your passcode, (though you do backup, right?) but fantastic if someone&rsquo;s trying to break into your phone to pillage the device for everything it can find out.</p>
<p>Some food for thought.</p>]]></description>
			<author>no@spam.com (Michael Feldbauer)</author>
			<pubDate><![CDATA[Fri, 09 Dec 2016 11:00:00 ACST]]></pubDate>
			<guid isPermaLink="true">https://www.itblog.com.au/articles/7/1/iOS-Security/Page1.html</guid>
		</item>
	</channel>
</rss>